QUESTION 127Which of the following statements about access lists are true? (Choose three.)

A. Extended access lists should be placed as near as possible to the destinationB. Extended access lists should be placed as near as possible to the sourceC. Standard access lists should be placed as near as possible to the destinationD. Standard access lists should be placed as near as possible to the sourceE. Standard access lists filter on the source addressF. Standard access lists filter on the destination address

Answer: BCE

QUESTION 128In which stage of an attack does the attacker discover devices on a target network?

Answer: CEExplanation:The other choices are not functions of SIEM software.

QUESTION 133If a packet matches more than one class map in an individual feature type’s policy map, how does the ASA handle the packet?

A. the ASA will apply the actions from only the last matching class maps it finds for the feature type.B. the ASA will apply the actions from all matching class maps it finds for the feature type.C. the ASA will apply the actions from only the most specific matching class map it finds for the feature type.D. the ASA will apply the actions from only the first matching class maps it finds for the feature type

Answer: DExplanation:If it matches a class map for a given feature type, it will NOT attempt to match to any subsequent class maps.

QUESTION 134What statement provides the best definition of malware?

A. Malware is tools and applications that remove unwanted programs.B. Malware is a software used by nation states to commit cyber-crimes.C. Malware is unwanted software that is harmful or destructiveD. Malware is a collection of worms, viruses and Trojan horses that is distributed as a single…..

Answer: C

QUESTION 135Your security team has discovered a malicious program that has been harvesting the CEO’s email messages and the company’s user database for the last 6 months. What are two possible types of attacks your team discovered?

QUESTION 137What is the only permitted operation for processing multicast traffic on zone-based firewalls?

A. Stateful inspection of multicast traffic is supported only for the self-zone.B. Stateful inspection of multicast traffic is supported only between the self-zone and the internal zone.C. Only control plane policing can protect the control plane against multicast traffic.D. Stateful inspection of multicast traffic is supported only for the internal zone

Answer: CExplanation:Stateful inspection of multicast traffic is NOT supported by Cisco Zone based firewalls OR Cisco Classic firewall.